Monday, June 29, 2015

Ubuntu introduces a new way to enjoy content and services on your smartphones.




The tech landscape is dominated by the smartphone and the tablet. These in turn are lorded-over by two competing operating systems familiar to us all, namely Apple's iOS and Google's Android, which can never be deposed, not even by Microsoft's millions. Right?

Not so. While Apple and Google slug it out with periodic updates to try and outdo each other, and in doing so hopefully tempt us tech buyers to swap from one major operating system to another, there are other smartphone-centric platforms out there vying for to be dominant in the longer term.

For example Windows Phone, has faltered due to its muddled tablet and desktop variants and lack of app support, and hasn't had much of an impact so far, though Microsoft hopes to change its fortunes with Windows 10 Mobile.

And then there are a the smaller and virtually unknown mobile platforms such as Jolla's Sailfish that are now starting to get some attention, with probably the most well-known being Ubuntu.

Several operating systems are fighting for the title of up-and-coming 'third ecosystem', and Ubuntu Phone has emerged as a new challenger.

Ubuntu introduces a new way to enjoy content and services on smartphones, without relying on traditional apps.Ubuntu phones are now available for sale across Europe and in China. You can purchase directly from their partners BQ and Meizu.
For the first time, you can use a phone that revolves around you and the content and services you use the most. Say goodbye to opening and switching between multiple apps and instead, let Ubuntu’s unique scopes bring everything you need to one screen.Ubuntu Phone has been designed with obsessive attention to detail. Form follows function throughout, from the ever-changing welcome screen to essentials like messaging and alarms. And the Launcher puts it all at your fingertips, whatever you’re doing with your phone.

Wednesday, June 24, 2015

Windows 10’s new browser



Microsoft is planning to radically overhaul its web browser in Windows 10. Sources familiar with the company’s Windows plans tell that the new browser, codenamed Spartan, will include a host of new features not found in rival browsers. Chief among the plans for Spartan is new inking support that allows Windows 10 users to annotate a web page with a stylus and send the notes and annotations to a friend or colleague. The web note service will be powered by Microsoft’s OneDrive cloud storage, meaning notes will be stored on a copy of a web page that can be accessed by any browser across multiple platforms. As annotations are shared, multiple users can doodle on a web page and share edits and annotations between groups.

Monday, June 22, 2015

Basic tips for search engine optimization



"SEO" means finding ways to increase your site's appearance in web visitors' search results. This generally means more traffic to your site.

While intense SEO can involve complex site restructuring with a firm (or consultant) that specializes in this area, there are a few simple steps you can take yourself to increase your search engine ranking.

All it requires is a little effort, and some re-thinking of how you approach content on your site.


Monitor where you stand

You won't know if your SEO efforts are working unless you monitor your search standings.You can keep an eye on your page rank with tools like Alexa and the Google toolbar.

It's also important to check your referrer log regularly to track where your visitors are coming from and the search terms they're using to find your site.

Friday, June 19, 2015

Ghost Keyboard (Notepad Trick)

People Use notepad to type and save some important or regular information, But very less people know that there is much more that we can do with Notepad.

What if i say that we can make Notepad to type automatically what ever we wish to…. Unreal ? Yes it is possible and you will be doing it by yourself in just a few moments.You can show it to your friends and surprise them. Basically it is a prank that you can do with anyone just for fun.


This Process is Also known as ” Ghost Keyboard Typing ” Because you dont even touch your keyboard and words starts displaying in your notepad automatically, When you show this to your friend or anyone else, they will be excited to learn this from you as well.

Thursday, June 18, 2015

Security tips to protect your website from hackers


Keep software up to date


It may seem obvious, but ensuring you keep all software up to date is vital in keeping your site secure. This applies to both the server operating system and any software you may be running on your website such as a CMS or forum. When website security holes are found in software, hackers are quick to attempt to abuse them.

If you are using a managed hosting solution then you don't need to worry so much about applying security updates for the operating system as the hosting company should take care of this.

If you are using third-party software on your website such as a CMS or forum, you should ensure you are quick to apply any security patches. Most vendors have a mailing list or RSS feed detailing any website security issues. WordPress, Umbraco and many other CMSes notify you of available system updates when you log in.


Wednesday, June 17, 2015

What is SSL Certificate and how it increases the website security?



When you are surfing the internet, a lot of information is being exchanged between the web host and the device being used to surf the internet. This type of information can always be easily breached by hackers, especially if it involves online transactions and this has always been a major issue when dealing with the internet. Nowadays, cases of online theft are becoming increasingly popular. There is one way of determining whether a site is safe to use through an SSL CERTIFICATE which is powered by the beauty of cryptography.

Copy Data automatically From USB to your PC On Insert



We sometime wish that if someone insert his/her USB Into your pc then its data automatically copy in to your system in hidden Form.There is no need of software in this. we will make it possible with the help of some Dos commands.
lets get started, Follow the below steps.

Steps to Disable or Enable Administrator Using Command Prompt




Command Prompt, also known as cmd.exe or just cmd (after its executable file name), is the command-line interpreter on OS/2 and eComStation, Windows CE and Windows NT operating systems. It is the counterpart of COMMAND.COM in DOS and Windows 9x systems (where it is also called "MS-DOS Prompt"), or some of the Unix shells used on Unix-like systems. (More advanced Unix shells must be compared with Windows PowerShell, another command-line interpreter of Windows.)


Tuesday, June 16, 2015

How make a Key Logger in C language.

Keylogger is a computer program which captures all the key strokes pressed by user in real time. It captures all the keys and write them to some file say log.txt and stores it on computer hard disk. Now sending these logs to emails or FTP address depends upon the type of keylogger that is keylogger is remote keylogger or physical keylogger. Physical keyloggers are useful when you have physical access to that system and can retrieve logs personally. While remote keyloggers can be used from anywhere in the world, the only requirement is that victim must have internet connection. Today we will be writing a C program of Physical keylogger or Keystroke logger which requires physical access of the system. We will be extending our logic in further programs to make it remote keylogger which sends logs to FTP’s and Emails directly.



Algorithm for writing a Simple Keylogger :

1. Create an Empty log file for storing keylogs.
2. Intercept keys pressed by user using GetAsyncKeyState() function.
3.  Store these intercepted values in file.
4.  Hide the Running Window Dialog to make it undetectable.
5.  Use while loop to make it running in all conditions.
6.  Add Sleep() function to reduce the CPU usage to 0%.


Thursday, May 7, 2015

CCNA Tutorials

CCNA tutorials Part 1
Introduction to networking devices


HUB


Hubs connect computers together in a star topology network. Due to their design, they increase the chances for collisions. Hubs operate in the physical layer  of the OSI model and have no intelligence. Hubs flood incoming packets to all ports all the time. For this reason, if a network is connected using hubs, the chances of a collision increases linearly with the number of computers (assuming equal bandwidth use). Hubs pose a security risk since all packets are flooded to all ports all the time. If a user has packet sniffing software, they can extract data from the network and potentially decode it and use it. Hubs make it easy to "spy" on users on the same LAN as you.

REPEATER



A repeater is an electronic device that receives a signal and retransmits it at a higher level and/or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances without degradation. Because repeaters work with the actual physical signal, and do not attempt to interpret the data being transmitted, they operate on the physical Layer, the first layer of the OSI model. Repeaters are majorly employed in long distance transmission to reduce the effect of attenuation. It is important to note that repeaters do not amplify the original signal but simply regenerate it.


Wednesday, May 6, 2015

What is WEP Wireless Encryption?




Wired Equivalent Privacy (WEP) is a security protocol for wireless networks that encrypts transmitted data . The disadvantage is that without any security, your data can be intercepted without difficulty.
However, WEP was an early attempt to secure wireless networks, and better security is now available such as DES, VPN, and WPA. 
WEP has three settings: Off (no security), 64-bit (weak security), 128-bit (a bit better security). WEP is not difficult to crack, and using it reduces performance slightly.
If you run a network with only the default security, where WEP is turned off, any of your neighbors can immediately log on to your network and use your Internet connection.
  • For wireless devices to communicate, all of them must use the same WEP setting. (40-bit and 64-bit WEP encryption are the same thing — 40-bit devices can communicate with 64-bit devices.)
While there is no extra performance cost to encrypting the longer key, there is a cost to transmitting the extra data over the network. 128-bit security is not much more difficult than 64-bit to crack, so if you are concerned about performance, consider using 64-bit. If you're very concerned about security, use WPA, which replaces WEP which is almost impossible to crack. 
The WEP concept of passphrase is introduced so that you do not have to enter complicated strings for keys by hand. The passphrase you enter is converted into complicated keys. Choose passphrases with the same care you would important passwords.
  • With 128-bit encryption, you need to enter a passphrase to generate each key.
  • All four keys must be specified, because WEP switches between them to make your traffic more difficult to break.
  • All devices within your LAN must use the same passphrases (i.e., the same keys).
WEP is not necessary if you have a gaming console such as PlayStation or Xbox, and there are no other computers on the network, and no neighbours nearby within wireless range.

Sunday, May 3, 2015

Joomla Tutorials

Learn the basics of Joomla


Wordpress Tutorials

Wordpress Tutorial Part 2 (Installing Wordpress)





In this lesson we review the different ways to get started with WordPress. The lesson walks users through the process of installing WordPress locally on their own computer so they can follow along with future lessons.

Wordpress Tutorials

Wordpress Tutorials Part 1


    1. WordPress is an online, open source website creation tool written in PHP. But in non-geek speak, it's probably the easiest and most powerful blogging and website content management system (or CMS) in existence today.

Saturday, May 2, 2015

Joomla Tutorials

Learn the basics of Joomla

In this video lesson we will help you to learn how to launch and develop your own Joomla website. You'll learn about basic core features, extensions and templates. You'll also learn how to create a custom backup using the CloudAccess.net Cloud Control Panel.



Android App Development

Android App Development Part 1


If you're new to Android app development, this where you should begin. ... You'll learnhow to create an Android project and run a debuggable version of the app. ... This class uses a tutorial format to create a small Android app.




Joomla Basics Video Tutorial


Learn Joomla Basics

  1. Joomla is an award-winning content management system (CMS), which enables you to build Web sites and powerful online applications. Many aspects, including its ease-of-use and extensibility, have made Joomla the most popular Web site software available


Tuesday, February 24, 2015

What is VPN?


A Virtual Private Network (VPN) is a network technology that creates a secure network connection over a public network such as the Internet or a private network owned by a service provider. Large corporations, educational institutions, and government agencies use VPN technology to enable remote users to securely connect to a private network.
A VPN can connect multiple sites over a large distance just like a Wide Area Network (WAN). VPNs are often used to extend intranets worldwide to disseminate information and news to a wide user base. Educational institutions use VPNs to connect campuses that can be distributed across the country or around the world.
In order to gain access to the private network, a user must be authenticated using a unique identification and a password. An authentication token is often used to gain access to a private network through a personal identification number (PIN) that a user must enter. The PIN is a unique authentication code that changes according to a specific frequency, usually every 30 seconds or so.

Monday, February 23, 2015

How to connect two laptops or computers wirelessly

How to connect two laptops or computers wirelessly
Need to quickly connect up to another laptop wirelessly so you can transfer some data without a router or Internet connection? 
However, if you have a laptop or computer that has a wireless card and so does your buddy, you can use the cards to make a wireless connection between the two computers. Once they are connected wirelessly (also called a peer-to-peer ad-hoc wireless network), you can easily share data between the computers.
You can create an ad-hoc network in Windows or in OS X and in this article I’ll explain the steps for creating the network 
It’s important to note that ad-hoc networks in general have certain limitations that make them only useful for certain situations. Firstly, the speed of an ad-hoc network is normally less than that of a normal infrastructure network. Ad-hoc network specs only require a max speed of 11Mbps, which is way slower
Setting Up an ad hoc Network

This tutorial will be written for Windows 7, but you can follow the same instructions for Windows 8 and Windows Vista. To get started, open the Control Panel and click on Network and Sharing Center.




On the next dialog, click on the Setup a new connection or network link towards the bottom.


Sunday, February 22, 2015

Network Topologies

Topologies

The first thing to consider about a network is its physical shape, or the design layout, which will be extremely important when you select a wiring scheme and design the wiring for a new installation.
Network really has two shapes, or two types of topology; one is physical and the other is logical. The physical topology is the shape you can see, and the logical topology is the shape that the data travels in.

Physical Topologies


Physical topology is further divided in two section
·         Point-to-point connections
·         Multipoint connections

Point-to-point connections


Only two devices are involved in a point-to-point connection, with one wire (or air, in the case of wireless) sitting between them.'


Creating a windows 8 like home page in HTML


 Here I have used CSS and HTML to create this windows 8 like home page in HTML. The main tags I have used are the <div> tags which I have used to create the tiles and with the help of CSS I have arranged the tiles according to my imagination.
Ex:
<div class="tile azul">
                                                <span class="titulo"> heading </span>
                                                </div>

Here I have given class names to the <div> tags to identify them separately and to give different properties to the tiles using CSS.
Ex:
<div class="tile azul">
                                                <span class="titulo"> heading </span>
                                                </div>
<div class="tile tileLargo verde">
                                   <span class="titulo"> heading </span>
                                    </div>

The <span> tag is used here to give a heading to each tile in the home page

Here is the HTML code for the windows 8 like home page.


Thursday, February 19, 2015

Introduction to IP Addressing

This document gives you basic information needed in order to configure your router for routing IP, such as how addresses are broken down and how sub netting works. 
The main requirement for IP Addressing is to have a sound knowledge of binary and decimal numbers.
Definition of some main words used in the process.


·         Address—The unique number ID assigned to one host or interface in a network.
·         Subnet—A portion of a network sharing a particular subnet address.
·         Subnet mask—A 32-bit combination used to describe which portion of an address refers to the subnet and which part refers to the host.
·         Interface—A network connection.



An IP address is an address used in order to uniquely identify a device on an IP network.
The address is made up of 32 binary bits, which can be divisible into a network portion and host portion with the help of a subnet mask.
The 32 binary bits are broken into four octets (1 octet = 8 bits). Each octet is converted to decimal and separated by a period (dot).
For this reason, an IP address is said to be expressed in dotted decimal format (for example, 172.16.81.100). The value in each octet ranges from 0 to 255 decimal, or 00000000 - 11111111 binary.
Here is how binary octets convert to decimal: The right most bit, or least significant bit, of an octet holds a value of 20. The bit just to the left of that holds a value of 21. This continues until the left-most bit, or most significant bit, which holds a value of 27. So if all binary bits are a one, the decimal equivalent would be 255 as shown here:


  1  1  1  1 1 1 1 1
128 64 32 16 8 4 2 1 (128+64+32+16+8+4+2+1=255)


 this is sample shows an IP address represented in both binary and decimal.

        10.       1.      23.      19 (decimal)

  00001010.00000001.00010111.00010011 (binary)

Producing a report using JSP and java

First import the required file to the jsp file.

<%@page import="pac.LoginServlet"%>
<%@page import="pac.SaveRegistrationsServlet"%>
<%@page import="pac.DatabaseConnection"%>
<%@ page import="java.io.*,java.util.*,java.sql.*"%>
<%@ page import="javax.servlet.http.*,javax.servlet.*" %>
<%@ taglib uri="http://java.sun.com/jsp/jstl/core" prefix="c"%>
<%@ taglib uri="http://java.sun.com/jsp/jstl/sql" prefix="sql"%>
As we are writing the java code in a JSP file we are using the <% %> tags to write the java code.

Next we write a java code to write the SQL query.

<% 
        String id=LoginServlet.id;
        out.print(id);
        DatabaseConnection db=new DatabaseConnection();
        String sql="SELECT * from members where m_id ='"+id+"'";
        Statement st=db.getConnection().createStatement();
        ResultSet rs=st.executeQuery(sql);
        while(rs.next()){
            out.print(rs.getString(2));
        %>


To create the database connection class read this: Database Connection

Friday, February 13, 2015

Getting data to table in a jsp file from an SQL database.

Follow the steps to get the data from a SQL database to a jsp file.

Here in this tutorial we are creating two java classes and one jsp file to import the data from a SQL database. First we’ll create the two java classes.

Here I am creating this to get user details so, first I’m creating a java class called “users” with the getters and the setters.
First we declare the variables

private String username;
private String password;

then we create the getters and the setters to get data and to change the data.

public User() {
    }

    public String getUsername() {
        return username;
    }

    public void setUsername(String username) {
        this.username = username;
    }

    public String getPassword() {
        return password;
    }

    public void setPassword(String password) {
        this.password = password;
    }
   


Thursday, February 12, 2015

How to Connect to a MySQL database in java web applications


Follow to the steps to connect the MySQL database


In your project open a new java class and name it, here ill name it as “DatabaseConnection”. Then write these import statements.

import java.sql.Connection;
import java.sql.DriverManager;
import java.sql.ResultSet;
import java.sql.Statement;



after importing the above files, inside the DatabaseConnection class write the below code

public Statement stmt;
    public ResultSet res;
    public Connection conn;
   
    public DatabaseConnection(){
       
    }
   
    @SuppressWarnings("CallThreadDumpStack")
    public Connection SetConnection(){
        try{
        
            Class.forName("com.mysql.jdbc.Driver");
            conn = DriverManager.getConnection("jdbc:mysql://localhost/lms","root","");
            
        }
        catch(Exception e){
           e.printStackTrace();
        }
        return conn;
       
    }
   
    public ResultSet getResult(String query, Connection conn){
            this.conn = conn;
            try{
                stmt = conn.createStatement();
                res = stmt.executeQuery(query);
               
               
            }
            catch(Exception e){
               
            }
            return res;
           
    
        }


Sunday, January 25, 2015

The JSP life cycle

A JSP life cycle can be defined as the entire process from its creation till the destruction which is similar to a servlet life cycle with an additional step which is required to compile a JSP into servlet.

There are several main processe that will be performed in a jsp life cycle

CompilationInitializationExecutionCleanup



These are much similar to the servlet life cycle

Saturday, January 24, 2015

Creating a file upload form using HTML and JSP



Follow the steps below to create a file upload form using a web application that includes HTML and JSP. In this form we must use the POST() method and not the GET() method. The form action attribute should be set to a JSP file that will handle the uploading process.
To upload a single file you should use a single <input .../> tag with attribute type="file". To allow multiple files uploading, include more than one input tags with different values for the name attribute. The browser associates a Browse button with each of them.


Below is the coding for the HTML file

<html>
<head>
<title>File Uploading Form</title>
</head>
<body>
<h3>File Upload by CodeMonkeyy</h3>
Select a file to upload: <br />
<form action="FileUpload" method="post"
                        enctype="multipart/form-data">
<input type="file" name="file" size="50" />
<br />
<input type="submit" value="Upload File" />
</form>
</body>
</html>

Friday, January 23, 2015

Creating a simple snake game using the HTML5 canvas


Here we are using the new canvas feature in HTML5 to create a simple snake game we used to play in our childhood.



First create a canvas in your HTML page

<canvas id="drawCanvas" width="600" height="600"></canvas>


Then we declare some variables we need in our cording

var drawCanvas = $("#drawCanvas")[0];
            var context = drawCanvas.getContext("2d");
            var width = $("#drawCanvas").width();
            var height = $("#drawCanvas").height();